Advertisement · 728 × 90

Posts by Thomas Lilja

Newcomers to password cracking should learn that in 1991 the 1st well known password cracker @alecmuffett.bsky.social's Crack introduced applying rules & permutations to dictionary words, such as substituting numbers for letters, reversing words, appending digits, & other common user habits. 1/3

1 year ago 42 15 3 3
Preview
Free Diagram Tool Aids Management of Complex ICS/OT Cybersecurity Decisions Cyber Decision Diagrams, a free tool designed to help organizations manage complex decisions related to ICS/OT cybersecurity. 

Free Diagram Tool Aids Management of Complex ICS/OT Cybersecurity Decisions

1 year ago 3 1 0 0
Preview
The Ultimate Guide to Sigma Rules Sigma rules are an open-source, platform agnostic format for building high-fidelity detections and engaging in proactive threat hunting so you can mature your security posture and overcome the cyberse...

Leveraging the capabilities of #Sigmarules can help optimize your log management solution for #security detection & response!

Learn about:
❓Why you should use them
📂Specific use cases
🦴Anatomy of a Sigma rule
🔍 Sigma rule event processing for adv. detection capabilities

graylog.org/post/the-ult...

1 year ago 3 1 1 0

I’d love one. 😊

1 year ago 1 0 1 0
Preview
Breaking: Cyberhaven Chrome Extension Compromised in Holiday Attack Campaign An attacker successfully phished a Cyberhaven employee, gained access to Chrome Web Store admin credentials, published a malicious version of the extension

An attacker successfully phished a Cyberhaven employee.

They gained access to their Chrome Web Store admin credentials and published a malicious version of the Cyberhaven extension.

Read my full writeup here:

www.vulnu.com/p/breaking-c...

Thanks @jaimeblascob.bsky.social and @johntuckner.me

1 year ago 40 17 0 0
motivational poster that says "there is no AI in TEAM"

motivational poster that says "there is no AI in TEAM"

I'm going to revolutionize the motivational industry

1 year ago 94 21 7 3

PSA: upgrade your FortiOS devices, they’re hiding a zero day again.

1 year ago 37 13 7 2
Preview
US Water Facilities Urged to Secure Access to Internet-Exposed HMIs EPA and CISA urge organizations in the water and wastewater systems sector to harden remote access to internet-exposed HMIs.

US Water Facilities Urged to Secure Access to Internet-Exposed HMIs

1 year ago 3 1 0 0
Preview
New Attacks Exploit VSCode Extensions and npm Packages Malicious campaigns targeting VSCode extensions have recently expanding to npm, risking software supply chains

New Attacks Exploit VSCode Extensions and npm Packages

1 year ago 0 1 0 0
Advertisement

So you want to be a SOC analyst?

Well, then this is for you…

1 year ago 3 0 0 0

Seeing as many security programs evaluate their coverage against Mitre Att&ck, it’s interesting to see the same being done for the products they rely on.

1 year ago 2 0 0 0

🙄

1 year ago 3 0 1 0

📢 ⬇️

1 year ago 815 494 3 8

Impressive indeed. But would it be enough to make Windows search usable? 🤔

1 year ago 0 0 0 0

This is brilliant! 😬🛬

1 year ago 0 0 0 0

I have been informed by my immigration firm I need to rapidly overcome burnout and depression and publish, publish, publish, knocked out a 15 page academic white paper yesterday and 8 page one today. If your publication needs something on industrial cybersecurity… 🙏💜

1 year ago 166 28 10 1
Preview
NIST issues updated cyber guides focused on assessments and communication Two new volumes were released by the National Institute of Standards and Technology that aim to broaden the publication’s applicability to organizations outside federal agencies.

NIST issues updated cyber guides focused on assessments and communication www.nextgov.com/cybersecurity/2024/12/ni...

1 year ago 4 1 0 0
Advertisement

We dodged the bullet once more. For the love of god why won’t they give up this madness.

1 year ago 0 0 0 0

Anyone here in ICS, OT, SCADA security that I missed and need to add?

1 year ago 8 7 1 0
Preview
Internet Archive | Manager - Patron Services The Internet Archive is looking for an outstanding individual to lead our Patron Services team. The Patron Services team operates similarly to customer service, quality assurance, trust and safety or ...

Ever wanted to help advance the Internet Archive's mission of "Universal Access to All Knowledge"?

We are hiring the manager of our Patron Services team.

For more information please see this job listing ⤵️
app.trinethire.com/companies/32...

1 year ago 708 184 3 2
Preview
Destructive Malware: Threat Detection and Incident Response Destructive malware makes systems, devices, and data unusuable to interrupt operations. With appropriate threat detection and incident response, organizations can mitigate destructive malware's impact...

Are you prepared to combat destructive #malware? ☠️⚠️

Trojans, worms, #ransomware & #botnets are all types of destructive malware that can wreck havoc on your systems. 😰

Learn about the motivations behind deploying it, how it works, & how #TDIR can help. 🛡️

graylog.org/post/destruc... #cybersecurity

1 year ago 1 1 0 0

Finding out is the gravity of the fucking around universe. There’s just no fighting it.

1 year ago 3 0 0 0

Watch out for rogue browser extensions synced to your enterprise devices by compromised personal accounts. 🔥

1 year ago 60 15 0 0
Preview
a man in a leather jacket is riding a motorcycle ALT: a man in a leather jacket is riding a motorcycle

And so it begins…

1 year ago 1 0 0 0

So, you disappeared Elite James Bond number of messages? 😬

1 year ago 0 0 0 0

Ever found yourself needing to decompress Windows 10/11 swap but lacked proper tooling?

If so, this is for you…

1 year ago 0 0 0 0

DDoSecrets has released Library of Leaks, an online database of millions of hacked and leaked documents

search.libraryofleaks.org

1 year ago 95 32 3 3
Advertisement
Preview
EDR Silencers and Beyond: Exploring Methods to Block EDR Communication - Part 1 For red teams and adversary alike it’s important to stay hidden. As many companies nowadays have EDR agents deployed those agents are always in focus and tools like EDRSilencer or EDRSandblast use…

🛡️Windows Firewall and WFP are only two ways to silence an #EDR agent.
📢In my latest blog post I discuss another network based technique to prevent data ingest and ways to detect it.

And if you want even more, checkout part 2 released by @Cyb3rMonk Link in the post

1 year ago 21 10 0 0
Preview
EDR Silencer and Beyond: Exploring Methods to Block EDR Communication - Part 2 Alternative methods for EDR Silencers for blocking EDR communication to disable defenses.

[NEW BLOG]
EDR Silencer and Beyond: Exploring Methods to Block EDR Communication - Part 2

In collaboration with
@fabian.bader.cloud


academy.bluraven.io/blog/edr-sil...

#redteam

1 year ago 16 5 1 0